Communication Security in MAS with XML Security Specifications

Article Preview

Abstract:

With widely applications of Multi-Agent System (MAS) on internet and intranet, how to ensure security regarding multi-agent communication is a big issue. Traditional cryptographic technologies support a coarse granularity security. This paper adopts XML security technology to provide a security mechanism for MAS communication. With the combination of XML security specifications and MAS, the paper presents a fine-grained security model for MAS communication. The model proposed can satisfy the security requirements of MAS communication based on XML data format.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

251-254

Citation:

Online since:

June 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Omicini, A. Ricci, M. Viroli. Agent Coordination Contexts for the formal specification and enactment of coordination and security policies. Science of Computer Programming 63, 2006, p.88–107.

DOI: 10.1016/j.scico.2005.07.014

Google Scholar

[2] L. Lhotska, L. Prieto. A Multi-agent System for Information Retrieval. Springer-Verlag, LNCS 4739, 2007, p.337 – 344.

Google Scholar

[3] S. Karnouskos. Security implications of implementing active network infrastructures using agent technology. Computer Networks, Volume 36, Issue 1, June 2001, pp.87-100.

DOI: 10.1016/s1389-1286(01)00155-4

Google Scholar

[4] P. Novák, M. Rollo, J. Hodík, T. Vlček. Communication Security in Multi-agent Systems. CEEMAS 2003, LNAI 2691, 2003, pp.454-463.

DOI: 10.1007/3-540-45023-8_44

Google Scholar

[5] N. Borselius, C. J. Mitchell. Securing FIPA Agent Communication. Security and Management, 2003, pp.135-141.

Google Scholar

[6] B. Lautenbach. Introduction to XML Encryption and XML signature. Information Security Technical Report. Vol. 9, No. 3, 2004, pp.6-18.

DOI: 10.1016/s1363-4127(04)00028-7

Google Scholar

[7] E. Bertino. XML security. Information security technical report. Vol 6. No2, 2001, pp.44-58.

DOI: 10.1016/s1363-4127(01)00206-0

Google Scholar

[8] M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon. XML signature syntax and processing (second edition) 2008. Available at: http: /www. w3. org/TR/xmldsig-core/ (Accessed on 6 December 2008).

Google Scholar

[9] T. Imamura, B. Dillaway, E. Simon. XML Encryption Syntax and Processing, December 2002, available at http: /www. w3. org/TR/xmlenc-core/ (Accessed on February 2009).

Google Scholar